Abdelkader Ouda
Abdelkader Ouda
Western University - Canada
Verified email at - Homepage
Cited by
Cited by
Resource allocation in a network-based cloud computing environment: design challenges
MA Sharkh, M Jammal, A Shami, A Ouda
IEEE Communications Magazine 51 (11), 46-52, 2013
Cloud-based DDoS attacks and defenses
M Darwish, A Ouda, LF Capretz
International Conference on Information Society (i-Society 2013), 67-71, 2013
A study of the interface usability issues of mobile learning applications for smart phones from the users perspective
A Ali, M Alrasheedi, A Ouda, LF Capretz
arXiv preprint arXiv:1501.01875, 2015
A conceptual framework for measuring the quality aspect of mobile learning
LF Capretz, A Ali, A Ouda
Bulletin of the IEEE Technical Committee on Learning Technologies 14 (4), 31, 2012
A resource scheduling model for cloud computing data centers
MA Sharkh, A Ouda, A Shami
2013 9th International Wireless Communications and Mobile Computingá…, 2013
A Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense against Denial of Service (DoS) Attacks
M Darwish, A Ouda, LF Capretz
A survey of wireless communications for IoT echo-systems
W Anani, A Ouda, A Hamou
2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECEá…, 2019
Localization and security enhancement of block-based image authentication
AH Ouda, MR El-Sakka
IEEE International Conference on Image Processing 2005 1, I-673, 2005
Optimal and suboptimal resource allocation techniques in cloud computing data centers
M Abu Sharkh, A Shami, A Ouda
Journal of Cloud Computing 6, 1-17, 2017
Evaluation of an OAuth 2.0 protocol implementation for web server applications
M Darwish, A Ouda
2015 International Conference and Workshop on Computing and Communicationá…, 2015
A framework for next generation user authentication
A Ouda
2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), 1-4, 2016
Security protocols in service-oriented architecture
AH Ouda, DS Allison, MAM Capretz
2010 6th World Congress on Services, 185-186, 2010
A classification module in data masking framework for business intelligence platform in healthcare
O Ali, A Ouda
2016 IEEE 7th Annual Information Technology, Electronics and Mobileá…, 2016
Study on integration of fastapi and machine learning for continuous authentication of behavioral biometrics
P Bansal, A Ouda
2022 International Symposium on Networks, Computers and Communicationsá…, 2022
Innovative data authentication model
A Ibrahim, A Ouda
2016 IEEE 7th Annual Information Technology, Electronics and Mobileá…, 2016
A hybrid-based filtering approach for user authentication
A Ibrahim, A Ouda
2017 IEEE 30th Canadian Conference on Electrical and Computer Engineeringá…, 2017
The importance of human dynamics in the future user authentication
W Anani, A Ouda
2017 IEEE 30th Canadian conference on electrical and computer engineeringá…, 2017
A practical version of Wong's watermarking technique
AH Ouda, MR El-Sakka
2004 International Conference on Image Processing, 2004. ICIP'04. 4, 2615-2618, 2004
User modeling via anomaly detection techniques for user authentication
IIMA Sulayman, A Ouda
2019 IEEE 10th Annual Information Technology, Electronics and Mobileá…, 2019
Simulating high availability scenarios in cloud data centers: a closer look
MA Sharkh, A Shami, P ÍhlÚn, A Ouda, A Kanso
2015 IEEE 7th International Conference on Cloud Computing Technology andá…, 2015
The system can't perform the operation now. Try again later.
Articles 1–20